Identity and Access Management What is Identity and Access Management? A set of business process and tools for providing access to the right resources at the right time for the right reasons. Providing visibility into who has access to what and why along with how the access is being used. IAM is not just about protecting organisations against main threats such as insider threats and credential theft, it is also about business enablement and improving the end-user experience. Why it matters According to a survey from The Identity Defined Security Alliance 94% of organizations have had an identity-related breach, which 99% believe could have been prevented. Blue ball Green ball Yellow ball Red ball Purple ball Diagonal straight lines curves outlines X-labels-Years 0-2 Years 2-5 Years 5+ Years Y-labels-Areas Identity and Access Management © Eviden SAS 2024. All rights reserved. Maturity 0-2 years 2-5 years 5+ years 0-2 years 2-5 years 5+ years The landscape The Move to the cloud and “as a Service models” This will continue to evolve as tools become cloud-native and are true SaaS tools. The use of machine learning and behavioral analytics for a more dynamic or adaptive way of working where decisions are made in near real time. Extending the role of identities and access beyond people and traditional roles and entitlements Identities are no longer limited to carbon-based units and are taking the form of devices (e.g. IoT) and applications (e.g. RPA). Convergence and Cybersecurity Mesh Architecture Defined by Gartner for centralized security operations, this architecture brings together a flexible architecture to encompass major technologies including SIEM, XDR, Identity and ZTNA to enable better integration and harmonizing output between different products in the detection and response space. It can also drive central intelligence, analytics and policy across different technologies, leading to better ROI. Key figures 38% of those technologies are either already adopted by most organizations or will be in the next two years. 50% of those technologies are expected to be adopted in the next 2 to 5 years cycle. 13% of those technologies are transformational and wide spread adoption will take over 5 years. Explore the top 8 cyber domains’ tech trends Advanced Detection & Response Cyber Incident Response Identity & Access Management Endpoint & Mobile Security Network Security Application Security Cloud Security Data Security